Sciweavers

1527 search results - page 31 / 306
» A Survey of Web Security
Sort
View
IADIS
2004
15 years 18 days ago
Security Assertion Exchange for the Agent on the Semantic Web
The Semantic Web's success will depend on the implementation and use of Web Service becoming preeminent in Ecommerce, which will likely be agent-based in the future. On the S...
Joo-Young Lee, Ki-Young Moon
CSREAESA
2008
15 years 19 days ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra
IPPS
2006
IEEE
15 years 5 months ago
Securing embedded programmable gate arrays in secure circuits
The purpose of this article is to propose a survey of possible approaches for implementing embedded reconfigurable gate arrays into secure circuits. A standard secure interfacing ...
Nicolas Valette, Lionel Torres, Gilles Sassatelli,...
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 3 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
ICEB
2004
175views Business» more  ICEB 2004»
15 years 18 days ago
Privacy-Preserving Data Mining in Electronic Surveys
Electronic surveys are an important resource in data mining. However, how to protect respondents' data privacy during the survey is a challenge to the security and privacy co...
Justin Z. Zhan, Stan Matwin